Cited in
(94)- On the performance of one perspective LSX-based block cipher
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- The design and implementation of protocol-based hidden key recovery
- An End-to-End Systems Approach to Elliptic Curve Cryptography
- Analysis and Optimization of Cryptographically Generated Addresses
- Scalar multiplication in elliptic curve libraries
- A Timing-Resistant Elliptic Curve Backdoor in RSA
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- Secure data deduplication with reliable data deletion in cloud
- An intrusion tolerant protection scheme of CA private key
- A logical characterisation of static equivalence
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library
- Accelerating the AES encryption function in openSSL for embedded systems
- Attacking AES using Bernstein's attack on modern processors
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- Implementing GCM on ARMv8
- Topics in Cryptology – CT-RSA 2006
- Fast cryptography in genus 2
- Cryptanalysis of GOST in the multiple-key scenario
- Speeding-up verification of digital signatures
- An Iterative Framework for Simulation Conformance
- Post-quantum key exchange for the Internet and the open quantum safe project
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Fast elliptic curve cryptography in OpenSSL
- Financial cryptography and data security. FC 2011 workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28--March 4, 2011. Revised selected papers
- Hashing garbled circuits for free
- The security impact of a new cryptographic library
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- The software performance of authenticated-encryption modes
- Efficient cache attacks on AES, and countermeasures
- High-performance implementation of elliptic curve cryptography using vector instructions
- Integrated Formal Methods
- Predicting Secret Keys Via Branch Prediction
- New Results on Instruction Cache Attacks
- Software implementation of modular exponentiation, using advanced vector instructions architectures
- LiDIA
- MCBC
- EFD
- MPIR
- MIRACL
- eBASH
- Software optimizations for cryptographic primitives on general purpose x86\_64 platforms
- GnuPG
- mpFq
- eBACS
- gf2x
- CryptoVerif
- NaCl
- Crypto++
- TweetNaCl
- MAGIC
- Echidna
- McBits
- Secure electronic bills of lading: Blind counts and digital signatures
- TweetNaCl: A Crypto Library in 100 Tweets
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- COBRA
- DNSCurve
- ELmE
- OleF
- POEx
- FleXOR
- libgarble
- s2n
- liboqs
- Curve25519
- mbed TLS
- Lockr
- PassPoints
- WolfSSL
- Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18--20, 2007. Proceedings
- Libgcrypt
- Backflip
- libOTe
- Extended Hidden Number Problem and Its Cryptanalytic Applications
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Sequential aggregate signatures with lazy verification from trapdoor permutations. (Extended abstract)
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Fast implementation of Curve25519 using AVX2
- Montgomery multiplication using vector instructions
- LEDAcrypt
- Rowhammer.js
- Improving timing attack on RSA-CRT via error detection and correction strategy
- Topics in cryptology -- CT-RSA 2008. The cryptographers' track at the RSA conference 2008, San Francisco, CA, USA, April 8--11, 2008. Proceedings
- Acoustic cryptanalysis
- Cache-timing template attacks
- Speculative dereferencing: reviving foreshadow
- Verification, Model Checking, and Abstract Interpretation
- Practical realisation and elimination of an ECC-related software bug attack
- Sequential aggregate signatures with lazy verification from trapdoor permutations
This page was built for software: OpenSSL